Please see attached. Answer questions and follow the instructions
Network Forensics | Lab 5 |
Name:
G#:
Lab Questions:
ANSWERS MUST BE IN COMPLETE SENTENCES FOR FULL CREDIT.
USE YOUR OWN WORDS.
YOU WILL NOT RECEIVE CREDIT FOR QUESTIONS THAT ASK FOR DEFINITIONS OR EXAMPLES IF YOU USE THE ONES GIVEN IN THE DIRECTIONS.
Google ARP spoofing. Write a definition below in your own words.
What is promiscuous mode (in the context of a packet sniffer):
In your own words, describe the three way handshake?
Where are cookies stored?
Name two types of index.dat files that are of forensic interest?
How might a criminal use a key logger?
How might an investigator use a key logger? What legal authority would be required before a keylogger could be used?
What federal laws might be violated by unauthorized use of a key logger?
©2007, 2014, 2015 Anne Marchant, Rebecca J. Tenally, Alex Mbaziir By submitting this assignment, I certify I have abided by all requirements of the GMU honor code. I certify that this is entirely my own work, no unauthorized sources have been used, and all sources used have been properly cited. |